-
2
-
-
56349169778
-
Is an HCI revolution just around the corner?
-
CANNY, J. 2006. Is an HCI revolution just around the corner? ACM Queue 4, 6.
-
(2006)
ACM Queue
, vol.4
, pp. 6
-
-
CANNY, J.1
-
6
-
-
56349094225
-
-
University of North Texas Internal Survey
-
DANTU, R. AND KOLAN, P. 2006. Survey of Calling Patterns. University of North Texas Internal Survey, http://secnet.csci.unt.edu/nuisance/.
-
(2006)
Survey of Calling Patterns
-
-
DANTU, R.1
KOLAN, P.2
-
9
-
-
34247960076
-
The strength of Weak Ties
-
GRANOVETTER, M. S. 1973. The strength of Weak Ties. Amer. J. Sociol. 78, 1360-1380.
-
(1973)
Amer. J. Sociol
, vol.78
, pp. 1360-1380
-
-
GRANOVETTER, M.S.1
-
11
-
-
61749086157
-
Identifying spam without peeking at the contents
-
HERSHKOP, S. AND STOLFO, S. J. 2004. Identifying spam without peeking at the contents. ACM Crossroads.
-
(2004)
ACM Crossroads
-
-
HERSHKOP, S.1
STOLFO, S.J.2
-
15
-
-
34748856132
-
Automatic calibration using receiver operating characteristics curves
-
Bangalore, India
-
KOLAN, P., VAITHILINGAM, R., AND DANTU, R. 2007. Automatic calibration using receiver operating characteristics curves. In Comsware Workshop. Bangalore, India.
-
(2007)
Comsware Workshop
-
-
KOLAN, P.1
VAITHILINGAM, R.2
DANTU, R.3
-
17
-
-
34748842226
-
-
LUCY, S. 2006. Is your VoIP phone vulnerable? http://www.businessweek.com/technology/content/jun2006/tc20060613_799282. htm?campaign_id=bier_tcj.
-
(2006)
Is your VoIP phone vulnerable
-
-
LUCY, S.1
-
18
-
-
85043988965
-
Finding similar files in a large file system
-
San Fransisco, CA
-
MANBER, U. 1994. Finding similar files in a large file system. In Usenix Winter (San Fransisco, CA), 1-10.
-
(1994)
Usenix Winter
, pp. 1-10
-
-
MANBER, U.1
-
19
-
-
84959839644
-
Measuring tie strength
-
MARSDEN, P. V. AND CAMPBELL, K. E. 1984. Measuring tie strength. Social Forces 63, 2, 482-501.
-
(1984)
Social Forces
, vol.63
, Issue.2
, pp. 482-501
-
-
MARSDEN, P.V.1
CAMPBELL, K.E.2
-
21
-
-
33845791268
-
Chung-Kwei: A pattern discovery based system for the automatic identification of unsolicited e-mail messages
-
RIGOUTSOS, I. AND HUYNH, T. 2004. Chung-Kwei: A pattern discovery based system for the automatic identification of unsolicited e-mail messages. In Proceedings of the first Conference on E-mail and Anti-Spam.
-
(2004)
Proceedings of the first Conference on E-mail and Anti-Spam
-
-
RIGOUTSOS, I.1
HUYNH, T.2
-
22
-
-
0037984544
-
-
RFC 3261
-
ROSENBERG, J., SHULZRINNE, H., CAMERILLO, G., JOHNSTON, A., PETERSON, J., SPARKS, R., HANDLEY, M., AND SCHOOLER, E. 2002. Session Initiation Protocol. RFC 3261.
-
(2002)
Session Initiation Protocol
-
-
ROSENBERG, J.1
SHULZRINNE, H.2
CAMERILLO, G.3
JOHNSTON, A.4
PETERSON, J.5
SPARKS, R.6
HANDLEY, M.7
SCHOOLER, E.8
-
23
-
-
33947689306
-
The Session Initiation Protocol (SIP) and spam
-
draft-ietf-sipping-spam-02.txt
-
ROSENBERG, J., JENNINGS, C., AND PETERSON, J. 2006. The Session Initiation Protocol (SIP) and spam. Spam Draft - draft-ietf-sipping-spam-02.txt
-
(2006)
Spam Draft
-
-
ROSENBERG, J.1
JENNINGS, C.2
PETERSON, J.3
-
24
-
-
0009304541
-
A bayesian approach to filtering junk e-mail. Learning for text categorization -
-
AAAI Tech. Rep. WS-98-05
-
SAHAMI, M., DUMAIS, S., HECKERMAN, D., AND HORVITZ, E. 1998. A bayesian approach to filtering junk e-mail. Learning for text categorization - Papers from the National Conference on Artificial Intelligence Workshop, 55-62, AAAI Tech. Rep. WS-98-05.
-
(1998)
Papers from the National Conference on Artificial Intelligence Workshop
, pp. 55-62
-
-
SAHAMI, M.1
DUMAIS, S.2
HECKERMAN, D.3
HORVITZ, E.4
-
25
-
-
1542634596
-
A memory based approach to anti-spam filtering for mailing lists
-
SAKKIS, G., ANDROUTSOPOULOS, I., PALIOURAS, G., KARKALETSIS, V., SPYROPOULOS, C. D., AND STAMATOPOULOS, P. 2003. A memory based approach to anti-spam filtering for mailing lists. Information Retrieval.
-
(2003)
Information Retrieval
-
-
SAKKIS, G.1
ANDROUTSOPOULOS, I.2
PALIOURAS, G.3
KARKALETSIS, V.4
SPYROPOULOS, C.D.5
STAMATOPOULOS, P.6
|